Data collocation throttling and compression in paths. The features of the vlan is easily add a device in any network also Easy to manage and maintain the network. Easily transfer a device from a network to another network without the need to transfer the wire from port to port. There are many types of VLAN and each type has a specific function such as data vlan, native vlan, default vlan, voice vlan and management vlan and every one they are another function to communication within vlans. Also there are two types vlans to connecting the static vlan port and the dynamic vlan port. Static vlan port This is method depends on the network engineer to bind. Which is implemented on the VLAN network manually meaning that when it builds the VLAN network it will Divide ports on the network manually as desired Ddynamic vlan port This automatic method depends on adding ports Connected to computers and this method is depend on the Mac Address in special device to be added in the Vlan network. There are two different types of link in a switched environment firstly the access link, this link communicate is only part with one vlan. Second link is trunk link that can carry multiple vlans and originally gained their name after system trunks that carry multiple vlans. Also it can be link between two switches between a switch and router. Creating the vlans to span more than connected switch. There needs away for every one to keep track of all users and frame as they travel the switch fabric vlans. Switch fabric is a group switches sharing the same vlan information.
Vlan identification methods by inter switch link ISL in routing used on a switch port and router interfaces IEEE 802 1Q is a standard method of frame tagging and its trucking between Cisco switched link and different brand switch Bhavna 2015. The hosts or any ip addressable device to communicate between vlans a router is absolutely necessary. For this can using the router that has an interface for each vlans. And can be use one fast Ethernet and run by ISL or 802 IQ trucking. This allows all vlans to communicate through one interface cisco call Router on a stick. And the expiation for this subject more than that also there how to configure switches and link between them by protocols known in cisco switches and another so that summaries how to communication within between vlans. Task 1 b) Security and privacy Every broadcast packet sent on a regular LAN it will show by all devices on the network even either the packet does not belong to all of them. User on the network can easily access to another network. So on this case there is no privacy and security will be less and will fall on trouble. However with this strategy this problem will be eliminated because VLANs are partitioned because they are required as a specific partition and then put each group of users in the specified partition. So in this case no one of the user can get any package sent does not belong to it Also the same he cannot access the other partition resources. This means that virtual LAN enhances or increases security and privacy. ACL Access Control Lists can enhance network security by blocking the specified IP traffic and can serves as one aspect of maintaining network security. However because ACL Do not provide user or device authentication or malware protection manipulation of data transmitted in the transmission of IP packets should not be reliable for a complete security solution. Task 1 c) STP spanning Tree Protocol is a protocol that prevents data rotation in the switches it understands the rule it says if a single link is connected between two switches by one link that happen rotation of the data. But if it is connected most of the Links like three Links or Four Links in this case will happen turnover for the data. The function of the STP protocol to regulate the link and prevent data turnover in Switches And this protocol works automatically without activating it on the switch in the process of organizing the existing of the link it will select one link for the data transmission process and others links will be suspended temporarily and if there is a malfunction in the link sending the data. So in this case the STP protocol will automatically trigger a second link to take a role the first link and start with the transmission and receiving operation STP protocol works at layer2 Data link layer STP protocol works at all switches such as Cisco juniper and Huawei switches STP protocol belongs to IEEE organization and classification 802 ID.
There are two Types of the switches used in STP protocol such as Root bridge, Non bridge. The operation to choose which switches and who defined main switch root bridge and who reserve switch non bridge this operation will pass the switches in a number of stages. So this only simple overview what is the spanning tree protocol and how to work in Vlans Introduction IPv4 was the first version of the Internet Protocol to be widely used accounts for most Internet traffic today. There More than 4 billion IPv4 address While this is a lot of IP addressing it is not enough to last forever IPv6 is the most recent numbering system provides a much larger address set of IPv4 It was published in 1999 Should meet the IP addressing in the world needs well in the future. Task 2 a) Different types of routing protocols are applied to a particular network environment. Three typical types of routing protocol are selected as simulation samples RIP OSBF and EIGRP RIP Routing Information Protocol is one of the oldest routing protocols still in service The number of hops is the measure used by Rip and the jump limit limits the size of the grid that Rip can support OSPF Open Shortest Path. First is the most widely used IGP internal gateway protocol enterprise large networks OSPF is based on the shortest path first SPF that is used to calculate the shortest path for each node EIGRP Enhanced Interior Gateway Routing Protocol is a proprietary Cisco routing protocol based on defusing an algorithm update EIGRP has the fastest rapport between the three protocols. Explanation how to use those protocols and compare between them for distance vector and link state and what it is the specification each one starting will explain to RIP protocol and what is version used secondary explain OSPF protocol finally EIGRP RIP protocol IPv4 version use in RIPv2 but RIPng use IPv6 version For RIP. There is allowed of arbitrary labels to routes but RIPng cannot allow of arbitrary tags to routes RIPv2 is support the updates authentication but RIPng cannot support the updates authentication OSPF protocol. Two version for this protocol first version OSPFv2 use IPv4 however OSPFv3 uses IPv6 The broadcast in OSPFv2 going to be recognised to them by using interfaces. Furthermore router neighbours in OSPFv3 which will be on the given link are identified and that will be by their own routers ID OSPFv2 is worked on within network called as Per IP Subnet Basis OSPFv3 is worked on within network that called as per link basis EIGRP protocol EIRGP is used in IPv4 usual IP address as multicast address but in IPv6 version EIRGP protocol used FF24 B EIRGP. in IPv6 is increased in network width more than IPv4 In EIRGP use IPv6 to route is filtered by using something that called as distributed list prefix list But EIRGP to use IPv4 doesnt route a filtered Bhavna En Singh 2015. Compare and contrast between RIP EIGRP and OSPF protocols in IPv6 Task 2 b Context Based Access Control CBAC Context based access control is a monitoring mechanism for each application that adds advanced traffic filtering operation to firewalls that are not limited to access packets network packets or transport layers.
While context based access control examines each of these layers it also inspects the application layer protocol data to observe the status of a specific TCP or UDP session This means that as numerous channels are formed or used by applications such as SQL Net RPC and FTP Context based access control can reply by creating temporary slots in the firewall access lists to allow for back traffic and additional data connections for specific sessions that created from within a protected network. This application layer realization and ability to develop with traffic is beyond the abilities of access list techniques. It is important known how the Access Control Lists ACLs work. There are two types in Access Control Lists work are standard and extended. The standard ACLs are filter only on the source network addresses and therefore limited to Layer 3 capabilities. The Extended Filter can be populated on the port numbers extending its reach to layer 4 In either case any ACL allows the traffic to enter the network is actually A hole in the firewall or a security perimeter that can be exploited by others. Temporary ACL data can be generated for incoming traffic based on outbound traffic which reduces the risk of exploitation. Regrettably reflexive Access Control Lists are limited to Layer four filters like any other extended Moreover reflexive ACL can not handle changes in port assignments by external host such as FTP. Another limitation of reflectivity is that it is limited to single channel applications Context Based Access Control List Advantages Context based Access Control list CBAC adds intelligence inspection to the ACL abilities by reading the entire package for application status information which is stored in the state table. Such as reflexive CBCA watches outbound traffic to define what beams to allow in But dissimilar reflexive CBCA can take decisions based on how the application performs not just the addresses and port number it uses. Any additional internal channels that are required to return the data that is negotiated by the outgoing data for a specific application can be opened. When the session ends the state table and the Access Control List entrances are deleted and the opening is closed to additional traffic. The protocols used in Context Based Access Control List CBAC. There are many protocols to use configure by CBAC and the list of protocols consist at some types of sessions such as TCP session application layer protocol, UDP session application layer protocol, FTP HTTP H 323 TFTP SMTP Real Audio SQL Net RPC. Stream works Unix R command ICMP protocol is required for support service in many network but in CBAC inspection is not support. All these protocols used to configure CBAC and this figure shown how to use some protocols in CBCA References 12 4T C I R 2016 IP Routing RIP Configuration Guide Cisco IOS Release 12 4T West Tasman Dri Cisco Systems Balchunas. A 2014 http www routeralley com. Online Available at http www routeralley com. Accessed 21 8 2014 Bhavna Rathi F S 2015 Performance Analysis of Distance Vector and Link State Routing Protocols Institute of Engineering and Technology 3 4 pp 32 23 Jain R 2016 Virtual LANs washington university 42 pp 8 1 Mr R Jayaprakash M K S 2015 RIP OSPF EIGRP ROUTING PROTOCOLS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS 37 pp 72 79 V Vetriselvan1 P R M 2014 Survey on the RIP OSPF EIGRP Routing Protocols Institute of Computer Technology Pune 5 2 pp 1058 1065 Zouheir Trabelsi W E H a S H 2008 Implementation of an ICMP Based Covert Channel for Volume 4244 2182 4.